Overview
overview
10Static
static
10autodist_p...2).zip
windows10-ltsc 2021-x64
10autodist_p...lt.exe
windows10-ltsc 2021-x64
10autodist_p...nt.exe
windows10-ltsc 2021-x64
10autodist_p...xe.xml
windows10-ltsc 2021-x64
3autodist_p...1).exe
windows10-ltsc 2021-x64
3autodist_p...2).exe
windows10-ltsc 2021-x64
3autodist_p...ks.exe
windows10-ltsc 2021-x64
3autodist_p...il.dll
windows10-ltsc 2021-x64
1autodist_p...at.dll
windows10-ltsc 2021-x64
1autodist_p...lt.xml
windows10-ltsc 2021-x64
3autodist_p...xe.xml
windows10-ltsc 2021-x64
3autodist_p...mp.exe
windows10-ltsc 2021-x64
10autodist_p...ib.dll
windows10-ltsc 2021-x64
1autodist_p...nt.exe
windows10-ltsc 2021-x64
10autodist_p...gs.xml
windows10-ltsc 2021-x64
3Analysis
-
max time kernel
559s -
max time network
561s -
platform
windows10-ltsc 2021_x64 -
resource
win10ltsc2021-20241023-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20241023-enlocale:en-usos:windows10-ltsc 2021-x64system -
submitted
12-11-2024 22:46
Behavioral task
behavioral1
Sample
autodist_proproctor_M2 (2).zip
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral2
Sample
autodist_proproctor_M2/Client-built.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral3
Sample
autodist_proproctor_M2/Client.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral4
Sample
autodist_proproctor_M2/Client.exe.xml
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral5
Sample
autodist_proproctor_M2/Clients/yamun@YAMUNA_A813E46/onlinetestwks (1).exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral6
Sample
autodist_proproctor_M2/Clients/yamun@YAMUNA_A813E46/onlinetestwks (2).exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral7
Sample
autodist_proproctor_M2/Clients/yamun@YAMUNA_A813E46/onlinetestwks.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral8
Sample
autodist_proproctor_M2/Mono.Cecil.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral9
Sample
autodist_proproctor_M2/Mono.Nat.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral10
Sample
autodist_proproctor_M2/Profiles/Default.xml
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral11
Sample
autodist_proproctor_M2/Quasar.exe.xml
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral12
Sample
autodist_proproctor_M2/Quasar.vmp.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral13
Sample
autodist_proproctor_M2/Vestris.ResourceLib.dll
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral14
Sample
autodist_proproctor_M2/client.exe
Resource
win10ltsc2021-20241023-en
Behavioral task
behavioral15
Sample
autodist_proproctor_M2/settings.xml
Resource
win10ltsc2021-20241023-en
General
-
Target
autodist_proproctor_M2 (2).zip
-
Size
34.9MB
-
MD5
38cbe4bfde65070ccbd42fd6d4fd7517
-
SHA1
a6c8e7cea56ffe8eae93db6128f440cfdf7078e7
-
SHA256
8e42aaf1c038c992a57bbeb607e21df8d7d2f40248c5b35cd431cac0a1b5c77f
-
SHA512
251405e6b4885f2e72be95494609899c7fbd51371e5389c9d3bfdbca7201af24a4ba3724ba409c9837960277194115575c3538c921afde456b96cd763b8d0c15
-
SSDEEP
786432:qK3WRVP/LiO0hSfYxv73lwlOxWyr4Rp73lwlOxWyr4RMst9:qK67iOwSf+73lxxWyrCp73lxxWyrCMc
Malware Config
Signatures
-
Quasar family
-
Quasar payload 8 IoCs
resource yara_rule behavioral1/files/0x0028000000045075-50.dat family_quasar behavioral1/memory/2416-54-0x0000000000830000-0x000000000148E000-memory.dmp family_quasar behavioral1/files/0x0003000000040d05-64.dat family_quasar behavioral1/memory/1664-66-0x00000000009B0000-0x0000000001610000-memory.dmp family_quasar behavioral1/files/0x0002000000040d08-73.dat family_quasar behavioral1/memory/632-83-0x0000000000360000-0x00000000003AA000-memory.dmp family_quasar behavioral1/files/0x0003000000040d16-202.dat family_quasar behavioral1/memory/188-204-0x00000000009E0000-0x0000000001640000-memory.dmp family_quasar -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Quasar.vmp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Client-built.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Client-built.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Client-built.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000\Control Panel\International\Geo\Nation Client-built.exe Key value queried \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000\Control Panel\International\Geo\Nation Client-built.exe -
Executes dropped EXE 8 IoCs
pid Process 5076 Quasar.vmp.exe 2416 Client.exe 1664 Client-built.exe 632 tmpF884.tmp.exe 3444 WindowsAudioServiceV3.exe 2372 Client-built.exe 188 Client-built.exe 5084 tmpAD49.tmp.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Docker Service = "\"C:\\Program Files (x86)\\DockerWorkshopV3\\WindowsAudioServiceV3.exe\"" WindowsAudioServiceV3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Docker Service = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\tmpF884.tmp.exe\"" tmpF884.tmp.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Client-built.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Client-built.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Client-built.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Client-built.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Quasar.vmp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Quasar.vmp.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Client-built.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Client-built.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 58 api.ipify.org -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 5076 Quasar.vmp.exe 5076 Quasar.vmp.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files (x86)\DockerWorkshopV3\WindowsAudioServiceV3.exe tmpF884.tmp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsAudioServiceV3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client-built.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client-built.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpAD49.tmp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Client-built.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmpF884.tmp.exe -
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000 taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\FriendlyName taskmgr.exe -
Modifies registry class 30 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:FMTID = "{00000000-0000-0000-0000-000000000000}" Quasar.vmp.exe Set value (data) \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 020000000100000000000000ffffffff Quasar.vmp.exe Set value (data) \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02020202 Quasar.vmp.exe Key created \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Quasar.vmp.exe Key created \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Quasar.vmp.exe Set value (str) \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell\SniffedFolderType = "Documents" Quasar.vmp.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Quasar.vmp.exe Set value (data) \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Quasar.vmp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByDirection = "1" Quasar.vmp.exe Key created \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings Quasar.vmp.exe Key created \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656} Quasar.vmp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupView = "0" Quasar.vmp.exe Set value (data) \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 020202 Quasar.vmp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1092616257" Quasar.vmp.exe Set value (data) \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\1\MRUListEx = ffffffff Quasar.vmp.exe Key created \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg Quasar.vmp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\FFlags = "1" Quasar.vmp.exe Set value (data) \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\1 = 14002e80922b16d365937a46956b92703aca08af0000 Quasar.vmp.exe Key created \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4 Quasar.vmp.exe Set value (data) \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Quasar.vmp.exe Key created \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2 Quasar.vmp.exe Key created \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\1 Quasar.vmp.exe Set value (data) \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\MRUListEx = 0100000000000000ffffffff Quasar.vmp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\2\1\NodeSlot = "4" Quasar.vmp.exe Key created \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\Shell Quasar.vmp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\Mode = "4" Quasar.vmp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\LogicalViewMode = "1" Quasar.vmp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\IconSize = "16" Quasar.vmp.exe Key created \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Quasar.vmp.exe Set value (int) \REGISTRY\USER\S-1-5-21-1263212995-3575756360-1418101905-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\4\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}\GroupByKey:PID = "0" Quasar.vmp.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe -
Suspicious behavior: GetForegroundWindowSpam 3 IoCs
pid Process 2908 7zFM.exe 5076 Quasar.vmp.exe 2176 taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeRestorePrivilege 2908 7zFM.exe Token: 35 2908 7zFM.exe Token: SeSecurityPrivilege 2908 7zFM.exe Token: SeDebugPrivilege 1664 Client-built.exe Token: SeDebugPrivilege 632 tmpF884.tmp.exe Token: SeDebugPrivilege 3444 WindowsAudioServiceV3.exe Token: SeDebugPrivilege 2176 taskmgr.exe Token: SeSystemProfilePrivilege 2176 taskmgr.exe Token: SeCreateGlobalPrivilege 2176 taskmgr.exe Token: SeDebugPrivilege 2372 Client-built.exe Token: SeDebugPrivilege 188 Client-built.exe Token: SeDebugPrivilege 5076 Quasar.vmp.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2908 7zFM.exe 2908 7zFM.exe 5076 Quasar.vmp.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 5076 Quasar.vmp.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe 2176 taskmgr.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 5076 Quasar.vmp.exe 3444 WindowsAudioServiceV3.exe 5076 Quasar.vmp.exe 5076 Quasar.vmp.exe 5076 Quasar.vmp.exe 5076 Quasar.vmp.exe 5076 Quasar.vmp.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1664 wrote to memory of 632 1664 Client-built.exe 102 PID 1664 wrote to memory of 632 1664 Client-built.exe 102 PID 1664 wrote to memory of 632 1664 Client-built.exe 102 PID 632 wrote to memory of 3444 632 tmpF884.tmp.exe 103 PID 632 wrote to memory of 3444 632 tmpF884.tmp.exe 103 PID 632 wrote to memory of 3444 632 tmpF884.tmp.exe 103 PID 188 wrote to memory of 5084 188 Client-built.exe 108 PID 188 wrote to memory of 5084 188 Client-built.exe 108 PID 188 wrote to memory of 5084 188 Client-built.exe 108 -
System policy modification 1 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Quasar.vmp.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Client-built.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Client-built.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Client-built.exe
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\autodist_proproctor_M2 (2).zip"1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2908
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\Quasar.vmp.exe"C:\Users\Admin\AppData\Local\Temp\Quasar.vmp.exe"1⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- System policy modification
PID:5076
-
C:\Users\Admin\AppData\Local\Temp\Client.exe"C:\Users\Admin\AppData\Local\Temp\Client.exe"1⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2416
-
C:\Users\Admin\Documents\Client-built.exe"C:\Users\Admin\Documents\Client-built.exe"1⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\tmpF884.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpF884.tmp.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Program Files (x86)\DockerWorkshopV3\WindowsAudioServiceV3.exe"C:\Program Files (x86)\DockerWorkshopV3\WindowsAudioServiceV3.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3444
-
-
-
C:\Windows\system32\taskmgr.exe"C:\Windows\system32\taskmgr.exe" /41⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2176
-
C:\Users\Admin\Documents\Client-built.exe"C:\Users\Admin\Documents\Client-built.exe"1⤵
- UAC bypass
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2372
-
C:\Users\Admin\Documents\Client-built.exe"C:\Users\Admin\Documents\Client-built.exe"1⤵
- UAC bypass
- Checks computer location settings
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:188 -
C:\Users\Admin\AppData\Local\Temp\tmpAD49.tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmpAD49.tmp.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5084
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
12.3MB
MD549fee9e45690cb2d12f32923ff5c7060
SHA1eaa52d56f0998b81bd54397d0d0d0c68d47e4838
SHA2564bcc56b8279bc707e0f6a21a9fddc8c67903383f84ba1bc0477b8327ab370719
SHA512e08c1fb1b1fb76dd6b6d768b397ca7b20bba1aa54affee551e248830ccf8bbf8957e888eb88be4725c047b52c592d13ebae1218771699739c31bcfb43f9d9390
-
Filesize
161B
MD5c16b0746faa39818049fe38709a82c62
SHA13fa322fe6ed724b1bc4fd52795428a36b7b8c131
SHA256d61bde901e7189cc97d45a1d4c4aa39d4c4de2b68419773ec774338506d659ad
SHA512cbcba899a067f8dc32cfcbd1779a6982d25955de91e1e02cee8eaf684a01b0dee3642c2a954903720ff6086de5a082147209868c03665c89f814c6219be2df7c
-
Filesize
178KB
MD50646998ef06d1e8d3471824151d23dfe
SHA1ff3d549f20df9740847a36b218f3565f8613e0ab
SHA2566e654a9dbb543d5a68d3d6c68daec7fd983304927b49fdc2d05a6cbc90601618
SHA512f39a46864389f476c2b850bbe39e40c92706b9ae2f95755dd4a557c5a0bb9a3d58c33b53f6a5627f1715f6c18d1c17b0b9a47762b2584ab6c203c0d7eaada54c
-
Filesize
277KB
MD58df4d6b5dc1629fcefcdc20210a88eac
SHA116c661757ad90eb84228aa3487db11a2eac6fe64
SHA2563e4288b32006fe8499b43a7f605bb7337931847a0aa79a33217a1d6d1a6c397e
SHA512874b4987865588efb806a283b0e785fd24e8b1562026edd43050e150bce6c883134f3c8ad0f8c107b0fb1b26fce6ddcc7e344a5f55c3788dac35035b13d15174
-
Filesize
45KB
MD5e3986207ac534dcc31265bbfbd2ccc79
SHA13f1139ed1a4e2332507765a60ed2bf4dc0d6c29e
SHA25689bf6331396dcf10a4d779059105f61a50b4d2fbbe7bf89cdd5dc3102296415f
SHA512ede1e4bd5763cbeee3b20b53c8678c2a73cd50ca6963235cfab5a7795fc8cc47b42a4e9e0b16b4b68d0b39590bd61fc0e63a9667ead2414e7d1bb2c5e7d95cbb
-
Filesize
1KB
MD57c656cad4513a2ff09f06412c49427fd
SHA118a7978a5c25f96b62767026f2fab30dd5222996
SHA256d8229435f417ac620cf926d6aa0c93a2b1739323503b552b3a1e8f7fc594d39a
SHA512c579259a9692dd01afb2522d8d33a8ee498e4737de44bb47daeb7edb8ad54b2b2e135a0f60ac2efd0f70c8ec4d43bb6a4b61820df4bda6eaf76fbcb14f35b222
-
Filesize
1014B
MD57a93a183ecd0710fb4cd1413dab7527e
SHA19291b9ad8eeb03ac54e096534b11ea9c860ef9ff
SHA256280bd4dc49b7b780aa9fa3e625ff3fde09cf4b2bd9438a4637837c06dbf7c2dd
SHA51239dd600908fe9bcda6bd89e4695f3b4cac1be6362603ed36b2fad0f13bbc474fdca20bf6f90262e081282e635ed771ee18dda7035af2cc5e9b92e5a6dc1caf40
-
Filesize
2.1MB
MD5a0dace1b704c623aba724810af79fb01
SHA139ccaaa4ed9840a2f8492f0bda615ae9f8e8b8dd
SHA256ef857f86022cd05c7916f9422ea9f731277b33a4c21efd2e2a475d95d6739f6d
SHA512b6ccc516c7b506d4ad8094474c9b558f79a189e0790344aac54f240a9124f13dff7d485fdbcc05d83ea7330ce673f88bd4a51c7c09668cf5a006ca09304054dc
-
Filesize
76KB
MD564e9cb25aeefeeba3bb579fb1a5559bc
SHA1e719f80fcbd952609475f3d4a42aa578b2034624
SHA25634cab594ce9c9af8e12a6923fc16468f5b87e168777db4be2f04db883c1db993
SHA512b21cd93f010b345b09b771d24b2e5eeed3b73a82fc16badafea7f0324e39477b0d7033623923313d2de5513cb778428ae10161ae7fc0d6b00e446f8d89cf0f8c
-
Filesize
410B
MD512251926fa9dcba8e4804f6a4b916738
SHA1e05acba7468274ad42d42f3074e26e46e2ae5474
SHA2564146117a7634ca0298529582217756dd06d19370d6806325ce0ab07878bb0c57
SHA512d9bb8b63ae15195e652412a5cfa81b863675a5405e8945dee8679b96ed65eac58ffe2af411981058ddc51640d7316a6535ccbaa9591d763df7f43380bc8ad104
-
Filesize
268KB
MD50db84d4cebc40434c9d350caed5fc9d9
SHA1215a64172f15e01a0c227907be8d254877519ca8
SHA2567f7c521207ede40cca08b0d5132bd20d742db81bb09d5f75ffe6e02fe638fae8
SHA51225579389947d540948a35d28b77e407784c40f48f8eae97b393d780e95e13093104bc439fc7944fac9837e66aad93fdd3e0891d356f6778aa3fa5c9182325c9b
-
Filesize
12.4MB
MD565d4e93d6f9cfb7805c84b31b9a7bde5
SHA16bad70a61721505fe61da80d1f8bf02a36f06193
SHA256d2b9632cc05eb493d1b79d1830593a06834d1ba3a25de8a79ae6fdc77cf17cb2
SHA51293b9eea55960e05b2c0eb5616ba3183aad1524a7697130a4e55385a0e69c9c80fc475786007abff2da59a28d42e91e1dab2447db3b52a95de1f405bf48bb3442
-
Filesize
12.4MB
MD50bbf67023ccb0d7d6118879bc247eb61
SHA1e3ee0dc910ef172aed0ce6c45114f018ef9775d8
SHA256cc7539e2b37920e4ff7992f28d16bae5f47e7b046bd9346d0642f93b7a7e59a8
SHA5122cfe23f243357e98d101a2a8bab4135056101471dd2547608bdf1fecd0772a7de652d4a780125709ca041597b90c6e52cc6d52154973782d07df3c423a40d171